Chapter Three: Review on privacy-preserving data comparison protocols in cloud computing
Leqi Jianga,b; Zhihua Xiaa,b; Xingming Suna,b a School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, Chinab Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing, China
Abstract
Data comparison is a crucial step in many operations, including data mining, data classification, image feature extraction, and image retrieval. With the existing data encryption technology, encrypted data computation and encrypted data comparison can be executed; however, there is no single data encryption method can meet the challenge of tackle the two tasks at the same time. ...